US11138869B2 - Alarm system - Google Patents
Alarm system Download PDFInfo
- Publication number
- US11138869B2 US11138869B2 US16/857,527 US202016857527A US11138869B2 US 11138869 B2 US11138869 B2 US 11138869B2 US 202016857527 A US202016857527 A US 202016857527A US 11138869 B2 US11138869 B2 US 11138869B2
- Authority
- US
- United States
- Prior art keywords
- disturbances
- alarm
- detector
- neural network
- training
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/185—Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
- G08B29/186—Fuzzy logic; neural networks
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G06N3/0454—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/0499—Feedforward networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/082—Learning methods modifying the architecture, e.g. adding, deleting or silencing nodes or connections
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/09—Supervised learning
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/1968—Interfaces for setting up or customising the system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/22—Status alarms responsive to presence or absence of persons
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
Definitions
- the present invention relates to a detector for an alarm system which comprises a neural network, a training system for an alarm system, and a method of training an alarm system.
- the detector's neural network is trained to discriminate false alarms which should not result in an alarm being triggered by the alarm system in a normal mode of operation from disturbances for which an alarm should be triggered in the normal mode of operation.
- the present invention may be particularly useful for, but is not limited to, an intruder alarm system for detecting intruders in a monitored area.
- False alarms may cause a delay in law enforcement being able to respond to a genuine emergency due to dealing with the false alarm.
- Some systems are registered with local law enforcement and law enforcement will attend the premises when the alarm is triggered. If false alarms are too frequent, the premises may be struck off the register and law enforcement will no longer attend the premises when the alarm is triggered. Similarly, the alarm may be ignored by neighbours if it is activated too frequently. Costs may also be incurred if the system is a monitored system and too many false alarms are triggered. The user may also become reluctant to arm the alarm due to the excessive number of false alarms. This then leaves the area vulnerable to intruders.
- PIR passive infrared
- Infrared energy body heat
- Passive infrared sensors are widely used in home security systems.
- the sensor of a typical system can detect heat and movement of heat sources in the region which it monitors, dividing this region into a protective “grid”. If a moving object is present in too many grid zones and/or the infrared energy levels change rapidly across the grid zones, the sensors are tripped, thus triggering the alarm.
- active signals such as ultrasound or radio frequency fields.
- sensors emit signals and detect a corresponding reflected signal.
- sensors may emit radio pulses and measure the reflection from a moving object in order to detect its movement.
- Sensors can also emit infrared signals from an LED following a similar principle.
- Typical alarm systems such as household alarms systems, are designed to detect a human intruder within the monitored area.
- other disturbances may also trigger the alarm.
- pets, robot vacuum cleaners, moving fans, or similar devices may trigger the alarm.
- Movement of objects in the monitored areas caused by draughts from heating systems, air conditioning systems or open windows/doors may also trigger the alarm.
- mechanical vibrations, electromagnetic disturbances, hot airflow and white light radiation can trigger the alarm.
- Typical security systems are tested extensively prior to selling to a customer. Testing typically involves simulated scenarios in a test area. These simulations could for example be an intruder breaking into a house or shop. The simulations are run in a controlled environment to allow the security system to detect the intruder and trigger an appropriate response.
- testing continues until the security system achieves a required level of accuracy. A certain level is required before the alarm can be certified for use.
- the testing of security systems can be a long process, and the simulated scenarios are often not perfect representations of real-world situations. When a security system is installed, there may be many other environment factors present that are not accounted for in the simulated scenarios.
- the present invention provides a detector for an alarm system, wherein the detector is operable to monitor a monitored area for disturbances, wherein the detector comprises a first neural network defined by a topology and a first set of parameters, wherein the first neural network has been trained to discriminate false alarms which should not result in an alarm being triggered by the alarm system in a normal mode of operation from disturbances for which an alarm should be triggered in the normal mode of operation, wherein the detector is configured to receive an input from a user instructing the detector to enter a training mode, and wherein the input includes a categorization setting instructing the detector to label subsequent disturbances recorded whilst the detector is in the training mode as either disturbances indicative of a false alarm, or as disturbances for which the alarm should be triggered in the normal mode of operation.
- the user can set the detector into a training mode of operation.
- the user may set a categorization setting which is applicable for that particular session.
- the categorization setting may either instruct the detector to label subsequent disturbances recorded whilst the detector is in the training mode as disturbances indicative of a false alarm (a “false alarm” training mode), or as disturbances for which the alarm should be triggered in the normal mode of operation (a “genuine alarm” training mode).
- the user may secure the monitored area without people inside, such that the monitored area is inaccessible to people, and then may set the detector into the training mode.
- the user may set the categorization setting in order to specify that any disturbances occurring whilst the detector is in the training mode should be labelled as indicative of a false alarm (i.e. disturbances for which the alarm should not be activated when in the normal mode of operation).
- a false alarm i.e. disturbances for which the alarm should not be activated when in the normal mode of operation.
- this establishes a base-line of environmental factors which could potentially give rise to false alarms. These environmental factors may be specific to the particular monitored area in which the detector is installed.
- the user may set the detector into the training mode and may set the categorization setting in order to specify that any disturbances occurring whilst the alarm is in the training mode should be labelled as disturbances for which the alarm should be triggered in the normal mode of operation (the “genuine alarm” training mode).
- the user can then simulate various activities which might be carried out by an intruder (for example, opening a window or door and moving around the monitored area).
- the detector may comprise a communications interface configured to send and receive information.
- the communications interface may be any wired or wireless interface. Examples of wireless interfaces include WiFi, Bluetooth, ZigBee etc.
- the detector may be configured to detect at least one of: infra-red radiation, sound waves, ultrasonic waves, and radio frequency waves.
- the detector may be a PIR sensor.
- the detector may utilize active signals such as ultrasound, infrared or radar, and may emit pulsed signals and measure the reflection off a moving object in order to detect its movement.
- the detector may therefore comprise at least one transducer operable to receive at least one of: infra-red radiation, sound waves, ultrasonic waves and radio frequency waves and operable to convert the received quantity into an electrical signal.
- the detector may comprise at least one transducer operable to generate at least one of: infra-red radiation, sound waves, ultrasonic waves and radio frequency waves.
- the detector may convert the detected quantity into electrical signals. These electrical signals may be processed to extract characteristic parameters from the electrical signals.
- the characteristic parameters may include at least one of frequency, phase shift, time delay, maximum, minimum and average value, amplitude, phase spectrum components, intensity and duration, for example.
- the detector may comprise a processor operable to process electrical signals received by the detector.
- the detector may be operable in a normal mode of operation.
- the normal mode may correspond to the detector being armed, i.e. operable to detect disturbances and generate an alarm if appropriate (i.e. if the disturbance is not dismissed as a false alarm).
- Such a normal mode may for example be activated when the monitored space is secure and there are no people in the monitored area.
- the detector may be set to operate in the normal mode (i.e. the detector may be armed) when the inhabitants leave the home for the day, or when the inhabitants go to bed for the night.
- the detector may also have an inactive mode (i.e. an off-mode). Such a mode will generally be set when there are authorised people in the monitored area. For example, where the detector is provided in a home, the detector may be set to operate in the inactive mode when the inhabitants are present and active in the house during the day time.
- an inactive mode i.e. an off-mode
- the detector may be configured to input the characteristic parameters of the electrical signals into the neural network and to compute the neural network response to determine if the detected disturbance is a false alarm (and hence can be disregarded, without triggering an alarm) or if the disturbance may potentially be caused by an intruder, such that the alarm should be triggered.
- the detector may be configured to send the characteristic parameters of the electrical signals and the associated label (i.e. labelled as a false alarm, or labelled as a disturbance for which the alarm should be triggered in the normal mode of operation, depending on the categorization setting chosen when setting the training mode) to a storage device when in the training mode.
- the characteristic parameters of the electrical signals and the associated label i.e. labelled as a false alarm, or labelled as a disturbance for which the alarm should be triggered in the normal mode of operation, depending on the categorization setting chosen when setting the training mode
- the detector in the training mode is configured to input the characteristic parameters of the electrical signals into the neural network and to compute the neural network response to determine the “expected response”—i.e. to determine if the detected disturbance would be considered a false alarm when the alarm is operating in the normal mode, or if the disturbance would be considered as potentially being caused by an intruder, such that the alarm should be triggered in the normal mode. Then, the detector may compare the “expected response” to the categorization setting, and may only send the characteristic parameters of the electrical signals and the associated label to the storage device if the two differ.
- the detector may send the characteristic parameters of the electrical signals and the associated label to the storage device.
- the “expected response” is that the disturbance is potentially caused by an intruder, but the categorization setting is “false alarm”
- the detector may send the characteristic parameters of the electrical signals and the associated label to the storage device.
- the “expected response” is that the disturbance is a false alarm, and the categorization setting is “false alarm”
- the detector may not send the characteristic parameters of the electrical signals and the associated label to the storage device.
- the invention extends to an alarm system comprising the detector of the first aspect, optionally with any of the optional features described above, and a storage device configured to store the characteristic parameters of the electrical signals and the associated label (i.e. labelled as a false alarm, or labelled as a disturbance for which the alarm should be triggered in the normal mode of operation, depending on the categorization setting chosen when setting the training mode).
- a storage device configured to store the characteristic parameters of the electrical signals and the associated label (i.e. labelled as a false alarm, or labelled as a disturbance for which the alarm should be triggered in the normal mode of operation, depending on the categorization setting chosen when setting the training mode).
- the alarm system may comprise a plurality of detectors. Each detector may have its own corresponding neural network. Each detector can be separately trained (i.e. each detector can be put into a training mode independently of the others). Alternatively, the system may be set up so that all of the detectors in the system are in the training mode at the same time.
- the storage device may be as part of the detector. However, this increases the size and costs of the detector.
- An alternative is to provide the storage device remotely from the detector.
- the storage device and detector may for example communicate with each other via a local network (wired, or wireless). In that case, the storage device may be in the vicinity of the detector and monitored area. Or, the storage device and detector may for example communicate with each other via the internet. In this case, the storage device may be located at a large distance from the detector.
- the storage device may be any suitable means for storage of information, including for example a solid state drive (SSD), a hard disk drive (HDD) or a cloud service.
- SSD solid state drive
- HDD hard disk drive
- cloud service a cloud service
- the storage device may comprise a communications interface configured to send and receive information.
- the communications interface may be any wired or wireless interface. Examples of wireless interfaces include WiFi, Bluetooth, ZigBee etc.
- the alarm system may comprise a user interface which allows the user to put the detector into the training mode.
- the user interface may allow the user to set a categorization setting which indicates that subsequent disturbances recorded whilst the detector is in the training mode should be labelled as either disturbances indicative of a false alarm, or as disturbances for which the alarm should be triggered in the normal mode of operation (a “genuine alarm”).
- the user interface may be configured to be run by a user device having a communications interface configured to send and receive information.
- the user device may for example be a mobile telephone, a tablet, a laptop or desktop computer, a smart watch or any similar device.
- the user interface may comprise an application or software program which is run by the user device.
- the alarm system may comprise a training system, wherein the training system comprises a communications interface configured to send and receive information, wherein the training system comprises a second neural network having the same topology as the first neural network and defined by a second set of parameters, wherein the second neural network has been trained to discriminate false alarms which should not result in an alarm being triggered by the alarm system in a normal mode of operation from disturbances for which an alarm should be triggered in the normal mode of operation, wherein the training system stores an existing training set of disturbances, the set of disturbances in the existing training set being labelled as either disturbances indicative of a false alarm, or as disturbances for which the alarm should be triggered in the normal mode of operation of the alarm system (“genuine alarms”), wherein the training system is configured to: receive a set of new labelled disturbances recorded by the detector; add the set of new labelled disturbances to the existing training set of disturbances to form an updated training set; retrain the second neural network using the updated training set to generate an updated set of neural network parameters; and send the updated
- the training system may be provided remotely from the detector (and the monitored area). In such a case, the training system may communicate with other components of the alarm system via the internet.
- the training system may comprise a processor and a storage medium such as a SSD, HDD or a cloud service.
- the “topology” of the neural network refers to the way in which the neurons of the neural network are connected.
- the first and second neural networks use multiple layers and various activation functions including ramp or sigmoid function.
- the neural network may be a two layer feed forward neural network with unipolar activation functions.
- the alarm system may be an intruder alarm system trained to detect intruders (for example, human intruders) in the monitored area.
- the security system could be in the “false alarm” training mode when a genuine disturbance occurs, caused by an intruder. In this instance, this intrusion will be labelled as a false alarm. If this data is subsequently used to retrain the neural network, the performance of the alarm system could degrade. To avoid this, the user interface may have a review function, allowing the user to confirm that the recorded disturbances do not include any genuine disturbances. Only once the data has been validated in this way is the information sent to the remote training system.
- a method of training an alarm system comprising: installing a detector to monitor a monitored area for disturbances, wherein the detector comprises a first neural network defined by a topology and a first set of parameters, wherein the neural network has been trained to discriminate false alarms which should not result in an alarm being triggered by the alarm system in a normal mode of operation from disturbances for which an alarm should be triggered in the normal mode of operation; instructing the detector to operate in a training mode; instructing the detector to label disturbances according to a categorization setting, wherein the categorization setting indicates whether the disturbances should be labelled as either false alarms or as disturbances for which an alarm should be triggered in a normal mode of operation (“genuine alarms”); recording disturbances, and labelling them according to the categorization setting to generate a set of labelled disturbances; sending the set of labelled disturbances to a training system comprising a second neural network having the same topology as the first neural network; adding the set
- the training system may be provided remotely from the detector (and the monitored area). In such a case, the training system may communicate with other components of the alarm system via the internet.
- the set of labelled disturbances Prior to sending the set of labelled disturbances to the training system, the set of labelled disturbances may be stored by a storage device, as disclosed above.
- the alarm system may be trained iteratively, such that the second neural network can be retrained multiple times, each time generating a new updated set of neural network parameters.
- the alarm system may be retrained after each training session.
- the user may run a training session following a false alarm, or following the failure to detect an intruder, for example.
- the alarm system may be retrained when the set of labelled disturbances comprises a number of disturbances that exceeds a predetermined threshold.
- the alarm system described in the foregoing may be configured to carry out the method described above (optionally including any of the optional features described).
- the foregoing method may be carried out by the alarm system described in the foregoing (optionally including any of the optional features described).
- a user interface for an alarm system wherein the user interface allows the user to put the alarm system into a training mode, and wherein the user interface allows the user to set a categorization setting which indicates that subsequent disturbances recorded whilst the detector is in the training mode should be labelled as either disturbances indicative of a false alarm, or as disturbances for which the alarm should be triggered in the normal mode of operation (“genuine alarms”).
- the user device may for example be a mobile telephone, a tablet, a laptop or desktop computer, a smart watch or any similar device.
- the user interface may comprise an application or software program which is run by the user device.
- a training system for an alarm system comprising a trained neural network having a set of parameters, wherein the trained neural network has been trained to discriminate false alarms which should not result in an alarm being triggered by the alarm system in a normal mode of operation from disturbances for which an alarm should be triggered in the normal mode of operation, wherein the training system stores an existing training set of disturbances, the disturbances in the existing training set being labelled as either disturbances indicative of a false alarm, or as disturbances for which the alarm should be triggered in the normal mode of operation of the alarm system, wherein the training system is configured to: receive a set of new labelled disturbances recorded by a detector of the alarm system; add the set of new labelled disturbances to the existing training set of disturbances to form an updated training set; retrain the trained neural network using the updated training set to generate an updated set of neural network parameters; and send the updated set of neural network parameters to the detector.
- Embodiments of the invention may allow for a detector and/or associated alarm system that can achieve improved accuracy in an installed location, due to the learning abilities of the detector and/or associated alarm system. That is, the detector and alarm system may effectively be customized to the specific environment in which they are installed. The detector and the alarm system may have the capability of learning the base-line of environmental factors which could potentially give rise to false alarms in the specific installed location. Moreover, the detector and the alarm system may have the capability of allowing the user to simulate various activities which might be carried out by an intruder in the specific installed location.
- FIG. 1 shows a security system
- FIG. 2 shows steps carried out by a detector
- FIG. 3 shows steps carried out by a training system.
- FIG. 1 shows a security system 100 .
- the system comprises a plurality of neural network based detectors 10 , a storage device 20 , a controlling device 30 and a remote training system 40 .
- the controlling device 30 in this case is a mobile phone, but may for example be a tablet, laptop, desktop PC, a smart watch or any similar device.
- the controlling device 30 comprises a user interface allowing the user to put the detectors 10 into a training mode.
- the security system 100 of FIG. 1 is for use in any type of area to be monitored.
- the system can be used in the user's home, alternatively it can be used in a public area or a place of business such as an office or a shop or any other area where it would be desirable to detect an unauthorised intruder.
- the user of the system 100 may therefore be the resident of the home or the proprietor of the place of business.
- the plurality of neural network based detectors 10 can be any type of detector that is able to detect the presence of an intruder within the monitored area.
- the detectors can comprise infra-red, radar, ultrasound, acoustic or optical sensors.
- the plurality of neural network based detectors 10 can also comprise a combination of different sensors depending on the type of unwanted disturbance to be detected in the monitored area.
- the plurality of neural network based detectors 10 are positioned throughout the monitored area.
- the number of neural network based detectors 10 required will depend on the size and configuration of the monitored area.
- the monitored area may comprise multiple sub-areas such as individual rooms within a home or office.
- multiple neural network based detectors 10 may be required to provide sufficient coverage to monitor the sub-area.
- Each of the individual neural network based detectors 10 may comprise the same type of sensor.
- each sub-area may have multiple neural network based detectors 10 , where each detector is configured to measure a different property.
- the particular sensor type may be chosen in consideration of the expected environmental considerations in the monitored area.
- the neural network based detectors 10 monitor the monitored area for disturbances.
- the neural network based detectors 10 comprise a neural network trained to discriminate between false alarms (for which an alarm should not be triggered) and genuine disturbances (for example, disturbances caused by an intruder).
- the neural networks present in the neural network based detectors 10 are trained on simulated scenarios. However, such scenarios are limited in number, and do not take into account the particular conditions of the specific area in which the detectors 10 are installed. As a result, false alarms may occur.
- the user may decide to retrain the neural networks present in the neural network based detectors 10 in the system 100 .
- the user uses the controlling device 30 to set the neural network based detectors 10 into the training mode. Then, the user sets a categorization setting to “false alarms” or “genuine alarms”, depending on whether the user wishes to train the neural network based detectors 10 to learn the background environmental conditions in the monitored area (i.e. to learn “false alarms”) or whether the user wishes to simulate “genuine alarms”.
- the purpose of the “false alarm” training mode is to record the data for ambient conditions within the monitored area and determine any routine disturbances that may occur when the security system is activated. This allows the system 100 to learn the expected or acceptable disturbances for which an alarm should not be triggered.
- the user should ensure that the monitored area is secure and that there are no people present in the monitored area. Then, the user can leave the system 100 running in the training mode, allowing the neural network based detectors 10 to accumulate date on any disturbances that occur.
- disturbances may be caused by pets (for example, cats or dogs), moving household devices (robot vacuum cleaners or rotating fans, for example) or any object that is caused to move by air currents, hot air flow, white light, electromagnetic or mechanical disturbances etc.
- the electrical signals measured by the neural network based detectors 10 are processed to determine characteristics parameters of the electrical signals.
- the characteristic parameters of the accumulated disturbances are tagged as “false alarms” and are sent to the storage device 20 .
- the characteristic parameters of the accumulated disturbances and “false alarm” tag are sent to the remote training system 40 .
- the remote training system 40 comprises a trained neural network having the same topology as the neural network of the neural network based detectors 10 .
- the remote training system 40 stores an existing training set of disturbances, the disturbances in the existing training set being labelled as either “false alarms” or “genuine alarms” and the trained neural network has been trained to discriminate between these.
- the remote training system 40 receives the set of new labelled disturbances recorded by the neural network based detectors 10 of the alarm system and adds these to the existing training set. Then, the remote training system 40 retrains the trained neural network using the updated training set to generate an updated set of neural network parameters.
- the updated set of neural network parameters are then sent to the neural network based detectors 10 .
- the neural network based detectors 10 then benefit from the retrained neural network, which has been retrained using the data accumulated during the “false alarm” training mode.
- the user can carry out this process following the installation of the alarm system 100 .
- the user can repeat this process until they are satisfied with the accuracy of the alarm system 100 .
- the user may also repeat the process if the usual conditions in the monitored area change. For example, the user might run the training mode if there is a new pet present in the monitored area, or if a new moveable device is used in the area. Additionally, the user may repeat the training process following a false alarm, or following the failure of the system to detect a genuine intruder.
- the purpose of the “genuine alarm” training mode is to simulate and record activities which might be carried out by an intruder, for example, entering through a door or window, and moving through the monitored area.
- the particular location of doors, windows etc. in the monitored area may affect how sensitive the alarm is to intruders, and so the “genuine alarm” training mode can be used to improve accuracy in detecting intruders.
- the user sets the categorization setting to “genuine alarms”, then the user should simulate intruder activity, allowing the neural network based detectors 10 to accumulate date on the disturbances that occur.
- the electrical signals measured by the neural network based detectors 10 are processed to determine characteristic parameters of the electrical signals.
- the characteristic parameters of the accumulated disturbances are tagged as “genuine alarms” and are sent to the storage device 20 .
- the characteristic parameters of the accumulated disturbances and “genuine alarm” tag are sent to the remote training system 40 .
- the remote training system 40 receives the set of new labelled disturbances and adds these to the existing training set. Then, the remote training system 40 retrains the trained neural network using the updated training set to generate an updated set of neural network parameters. The updated set of neural network parameters are then sent to the neural network based detectors 10 .
- the neural network based detectors 10 then benefit from the retrained neural network, which has been retrained using the data accumulated during the “genuine alarm” training mode.
- the neural network based detectors 10 , storage device 20 and controlling device 30 communicate over a local WiFi network.
- the remote training system 40 communicates with the network based detectors 10 and storage device 20 via the Internet.
- the training mode will not encompass every possible type of disturbance and therefore false alarms may still occur.
- FIG. 2 shows the method for training the security system of the present invention as carried out by the neural network based detectors 10 and storage device 30 .
- the security system 100 once the security system 100 has been installed within the house, which may involve positioning the neural network based detectors in each room of the house, the user activates the training mode via the user interface on the controlling device 30 at block 1000 .
- the user sets the training mode classification at block 2000 .
- the user selects the classification as “false alarm”.
- the user would request training mode and false alarm upon leaving the house for the day.
- the neural network based detectors 10 will then record disturbances throughout the day (block 3000 ).
- the disturbances may be caused by the normal ambient conditions within the particular house.
- This collected data will then be stored in the storage device (block 4000 ) as “false alarm” data.
- This newly stored data will then be sent to the remote training system 40 at block 5000 .
- the user interface on the controlling device 30 is used to deactivate the training mode.
- FIG. 3 Further steps of the method of training the alarm system 100 are shown in FIG. 3 —these steps are carried out by the remote training system 40 .
- the remote training system 40 receives a set of labelled disturbances and adds the set of labelled disturbances to an existing training set (block 7000 ). Then, at block 8000 , the neural network is retrained using the updated training set to generate an updated set of neural network parameters. The updated set of neural network parameters is then sent to the detector (block 9000 ).
- the security system could be in the “false alarm” training mode when a genuine disturbance occurs, caused by an intruder. In this instance, this intrusion will be labelled as a false alarm. If this data is subsequently used to retrain the neural network, the performance of the alarm system could degrade. To avoid this, the user interface may have a review function, allowing the user to confirm that the recorded disturbances do not include any genuine disturbances. Only once the data has been validated in this way is the information sent to the remote training system.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Evolutionary Computation (AREA)
- Software Systems (AREA)
- Artificial Intelligence (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Computational Linguistics (AREA)
- General Engineering & Computer Science (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Automation & Control Theory (AREA)
- Fuzzy Systems (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Human Computer Interaction (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims (11)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP19170903.9A EP3731203B1 (en) | 2019-04-24 | 2019-04-24 | Alarm system |
| EP19170903.9 | 2019-04-24 | ||
| EP19170903 | 2019-04-24 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20200342747A1 US20200342747A1 (en) | 2020-10-29 |
| US11138869B2 true US11138869B2 (en) | 2021-10-05 |
Family
ID=66286115
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/857,527 Active US11138869B2 (en) | 2019-04-24 | 2020-04-24 | Alarm system |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US11138869B2 (en) |
| EP (1) | EP3731203B1 (en) |
| CN (1) | CN111862559B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11620895B2 (en) * | 2020-08-05 | 2023-04-04 | Allstate Insurance Company | Systems and methods for disturbance detection and identification based on disturbance analysis |
| US20240220851A1 (en) * | 2022-12-29 | 2024-07-04 | The Adt Security Corporation | Systems and methods for on-device training machine learning models |
Citations (37)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5091780A (en) | 1990-05-09 | 1992-02-25 | Carnegie-Mellon University | A trainable security system emthod for the same |
| US5202661A (en) | 1991-04-18 | 1993-04-13 | The United States Of America As Represented By The Secretary Of The Navy | Method and system for fusing data from fixed and mobile security sensors |
| US5517429A (en) | 1992-05-08 | 1996-05-14 | Harrison; Dana C. | Intelligent area monitoring system |
| EP0897566A1 (en) | 1997-01-21 | 1999-02-24 | Nortel Networks Corporation | Monitoring and retraining neural network |
| US6366236B1 (en) * | 1999-08-12 | 2002-04-02 | Automotive Systems Laboratory, Inc. | Neural network radar processor |
| US20020057184A1 (en) * | 2000-03-17 | 2002-05-16 | Alex Davidkhanian | Slag detector for molten steel transfer operations |
| US20040155777A1 (en) * | 2003-01-24 | 2004-08-12 | Stelix Technologies Corp. | Apparatus and methods for protecting valuables |
| US6900729B2 (en) | 2003-03-17 | 2005-05-31 | Innovative Engineering & Consulting Corp. | Thermal signature intensity alarmer |
| US7127083B2 (en) | 2003-11-17 | 2006-10-24 | Vidient Systems, Inc. | Video surveillance system with object detection and probability scoring based on object class |
| US7447334B1 (en) | 2005-03-30 | 2008-11-04 | Hrl Laboratories, Llc | Motion recognition system |
| US20090033505A1 (en) * | 2007-08-03 | 2009-02-05 | Jones Russell K | Emergency notification device and system |
| US8253563B2 (en) | 2005-05-18 | 2012-08-28 | Idteq As | System and method for intrusion detection |
| US8384542B1 (en) | 2010-04-16 | 2013-02-26 | Kontek Industries, Inc. | Autonomous and federated sensory subsystems and networks for security systems |
| US8856057B2 (en) | 2012-09-13 | 2014-10-07 | James Albert Ionson | Cognitive security system and method |
| US8909926B2 (en) | 2002-10-21 | 2014-12-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
| US8909382B1 (en) | 2011-11-10 | 2014-12-09 | Universal Lighting Technologies, Inc. | Occupancy detection system and method having automatic adaptation capabilities |
| US20150039543A1 (en) * | 2013-07-31 | 2015-02-05 | Balakrishnan Athmanathan | Feature Based Three Stage Neural Network Intrusion Detection |
| US20150366518A1 (en) * | 2014-06-23 | 2015-12-24 | Robert Sampson | Apparatuses, Methods, Processes, and Systems Related to Significant Detrimental Changes in Health Parameters and Activating Lifesaving Measures |
| US9378634B1 (en) | 2014-12-30 | 2016-06-28 | Symantec Corporation | Leveraging neighbors' wireless access points in wireless-signal-variation-based physical intruder detection systems |
| US20160189505A1 (en) | 2014-12-30 | 2016-06-30 | Google Inc. | Systems and methods of providing status information in a smart home security detection system |
| CN105931402A (en) | 2016-06-27 | 2016-09-07 | 上海波汇科技股份有限公司 | Optical fiber perimeter intrusion monitoring method based on image recognition |
| US9520049B2 (en) | 2014-12-30 | 2016-12-13 | Google Inc. | Learned overrides for home security |
| CN106600869A (en) | 2016-12-31 | 2017-04-26 | 上海华魏光纤传感技术有限公司 | Fence intrusion identification method for fiber fence security protection system |
| US9652917B2 (en) | 2014-03-12 | 2017-05-16 | August Home, Inc. | Intelligent door lock system with automatic unlock |
| US9683392B1 (en) | 2013-03-15 | 2017-06-20 | August Home, Inc. | Intelligent door lock system with audio and RF Communication |
| CN107067605A (en) | 2016-12-31 | 2017-08-18 | 上海华魏光纤传感技术有限公司 | A kind of distributed optical fiber fence vibrating intruding recognition methods |
| CN107146355A (en) | 2017-07-07 | 2017-09-08 | 成都大眼图图科技有限公司 | A kind of fire early-warning system based on artificial intelligence technology |
| US20170293804A1 (en) | 2016-04-06 | 2017-10-12 | Nec Laboratories America, Inc. | Deep 3d attention long short-term memory for video-based action recognition |
| CN107454192A (en) | 2017-09-07 | 2017-12-08 | 成都清渟科技有限公司 | Water purification guarantee service system based on artificial intelligence |
| US20180000385A1 (en) | 2016-06-17 | 2018-01-04 | Blue Willow Systems Inc. | Method for detecting and responding to falls by residents within a facility |
| WO2018167349A2 (en) | 2017-03-15 | 2018-09-20 | Melendez Redondo Javier | Autonomous private safety system capable of providing passive and active services and combatting gender violence |
| WO2018195546A1 (en) | 2017-04-21 | 2018-10-25 | Tlc Millimeter Wave Products, Inc. | Millimeter wave advanced threat detection system network |
| US20180308475A1 (en) | 2017-04-20 | 2018-10-25 | Tyco Fire & Security Gmbh | Artificial Intelligence and Natural Language Processing Based Building and Fire Systems Management System |
| US20180315200A1 (en) | 2017-04-28 | 2018-11-01 | Cherry Labs, Inc. | Monitoring system |
| CN109035662A (en) | 2018-09-07 | 2018-12-18 | 电子科技大学 | A kind of perimeter alarm system invasion signal recognition method based on capacitor disturbance |
| CN109118689A (en) | 2018-10-25 | 2019-01-01 | 北京航天控制仪器研究所 | A kind of Intelligent optical fiber circumference intrusion alarm system |
| CN109410496A (en) | 2018-10-25 | 2019-03-01 | 北京交通大学 | Attack early warning method, apparatus and electronic equipment |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102006436B1 (en) * | 2015-10-30 | 2019-08-01 | 삼성에스디에스 주식회사 | Method for detecting false alarm |
| CN106228718B (en) * | 2016-09-26 | 2018-01-05 | 上海小蚁科技有限公司 | System and method for detecting security threat by network |
-
2019
- 2019-04-24 EP EP19170903.9A patent/EP3731203B1/en active Active
-
2020
- 2020-04-24 CN CN202010331047.1A patent/CN111862559B/en active Active
- 2020-04-24 US US16/857,527 patent/US11138869B2/en active Active
Patent Citations (37)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5091780A (en) | 1990-05-09 | 1992-02-25 | Carnegie-Mellon University | A trainable security system emthod for the same |
| US5202661A (en) | 1991-04-18 | 1993-04-13 | The United States Of America As Represented By The Secretary Of The Navy | Method and system for fusing data from fixed and mobile security sensors |
| US5517429A (en) | 1992-05-08 | 1996-05-14 | Harrison; Dana C. | Intelligent area monitoring system |
| EP0897566A1 (en) | 1997-01-21 | 1999-02-24 | Nortel Networks Corporation | Monitoring and retraining neural network |
| US6366236B1 (en) * | 1999-08-12 | 2002-04-02 | Automotive Systems Laboratory, Inc. | Neural network radar processor |
| US20020057184A1 (en) * | 2000-03-17 | 2002-05-16 | Alex Davidkhanian | Slag detector for molten steel transfer operations |
| US8909926B2 (en) | 2002-10-21 | 2014-12-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
| US20040155777A1 (en) * | 2003-01-24 | 2004-08-12 | Stelix Technologies Corp. | Apparatus and methods for protecting valuables |
| US6900729B2 (en) | 2003-03-17 | 2005-05-31 | Innovative Engineering & Consulting Corp. | Thermal signature intensity alarmer |
| US7127083B2 (en) | 2003-11-17 | 2006-10-24 | Vidient Systems, Inc. | Video surveillance system with object detection and probability scoring based on object class |
| US7447334B1 (en) | 2005-03-30 | 2008-11-04 | Hrl Laboratories, Llc | Motion recognition system |
| US8253563B2 (en) | 2005-05-18 | 2012-08-28 | Idteq As | System and method for intrusion detection |
| US20090033505A1 (en) * | 2007-08-03 | 2009-02-05 | Jones Russell K | Emergency notification device and system |
| US8384542B1 (en) | 2010-04-16 | 2013-02-26 | Kontek Industries, Inc. | Autonomous and federated sensory subsystems and networks for security systems |
| US8909382B1 (en) | 2011-11-10 | 2014-12-09 | Universal Lighting Technologies, Inc. | Occupancy detection system and method having automatic adaptation capabilities |
| US8856057B2 (en) | 2012-09-13 | 2014-10-07 | James Albert Ionson | Cognitive security system and method |
| US9683392B1 (en) | 2013-03-15 | 2017-06-20 | August Home, Inc. | Intelligent door lock system with audio and RF Communication |
| US20150039543A1 (en) * | 2013-07-31 | 2015-02-05 | Balakrishnan Athmanathan | Feature Based Three Stage Neural Network Intrusion Detection |
| US9652917B2 (en) | 2014-03-12 | 2017-05-16 | August Home, Inc. | Intelligent door lock system with automatic unlock |
| US20150366518A1 (en) * | 2014-06-23 | 2015-12-24 | Robert Sampson | Apparatuses, Methods, Processes, and Systems Related to Significant Detrimental Changes in Health Parameters and Activating Lifesaving Measures |
| US9378634B1 (en) | 2014-12-30 | 2016-06-28 | Symantec Corporation | Leveraging neighbors' wireless access points in wireless-signal-variation-based physical intruder detection systems |
| US20160189505A1 (en) | 2014-12-30 | 2016-06-30 | Google Inc. | Systems and methods of providing status information in a smart home security detection system |
| US9520049B2 (en) | 2014-12-30 | 2016-12-13 | Google Inc. | Learned overrides for home security |
| US20170293804A1 (en) | 2016-04-06 | 2017-10-12 | Nec Laboratories America, Inc. | Deep 3d attention long short-term memory for video-based action recognition |
| US20180000385A1 (en) | 2016-06-17 | 2018-01-04 | Blue Willow Systems Inc. | Method for detecting and responding to falls by residents within a facility |
| CN105931402A (en) | 2016-06-27 | 2016-09-07 | 上海波汇科技股份有限公司 | Optical fiber perimeter intrusion monitoring method based on image recognition |
| CN107067605A (en) | 2016-12-31 | 2017-08-18 | 上海华魏光纤传感技术有限公司 | A kind of distributed optical fiber fence vibrating intruding recognition methods |
| CN106600869A (en) | 2016-12-31 | 2017-04-26 | 上海华魏光纤传感技术有限公司 | Fence intrusion identification method for fiber fence security protection system |
| WO2018167349A2 (en) | 2017-03-15 | 2018-09-20 | Melendez Redondo Javier | Autonomous private safety system capable of providing passive and active services and combatting gender violence |
| US20180308475A1 (en) | 2017-04-20 | 2018-10-25 | Tyco Fire & Security Gmbh | Artificial Intelligence and Natural Language Processing Based Building and Fire Systems Management System |
| WO2018195546A1 (en) | 2017-04-21 | 2018-10-25 | Tlc Millimeter Wave Products, Inc. | Millimeter wave advanced threat detection system network |
| US20180315200A1 (en) | 2017-04-28 | 2018-11-01 | Cherry Labs, Inc. | Monitoring system |
| CN107146355A (en) | 2017-07-07 | 2017-09-08 | 成都大眼图图科技有限公司 | A kind of fire early-warning system based on artificial intelligence technology |
| CN107454192A (en) | 2017-09-07 | 2017-12-08 | 成都清渟科技有限公司 | Water purification guarantee service system based on artificial intelligence |
| CN109035662A (en) | 2018-09-07 | 2018-12-18 | 电子科技大学 | A kind of perimeter alarm system invasion signal recognition method based on capacitor disturbance |
| CN109118689A (en) | 2018-10-25 | 2019-01-01 | 北京航天控制仪器研究所 | A kind of Intelligent optical fiber circumference intrusion alarm system |
| CN109410496A (en) | 2018-10-25 | 2019-03-01 | 北京交通大学 | Attack early warning method, apparatus and electronic equipment |
Non-Patent Citations (5)
| Title |
|---|
| Badlani, Amit, et al., "Smart Home System Design based on Artificial Neural Networks", Proceedings of the World Congress on Engineering and Computer Science 2011, 6 pages. |
| European Search Report for application EP 19170903.9, dated Oct. 9, 2019, 9 pages. |
| Linda, Ondrej, et al., "Neural Network Based Intrusion Detection System for Critical Infrastructures", 2009 International Joint Conference on Neural Networks, 9 pages. |
| Naik, Anil, "Artificial Neural Network for Home Security System(ANNHSS)", Yuva Engineers, May 1, 2010, 12 pages. |
| Shareef, Israa, "Desing and Implementation of Smart Security System Based on Artificial Neural Network", ARPN Journal of Engineering and Applied Sciences 2016, 11 pages. |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111862559B (en) | 2024-12-24 |
| CN111862559A (en) | 2020-10-30 |
| US20200342747A1 (en) | 2020-10-29 |
| EP3731203B1 (en) | 2023-05-31 |
| EP3731203A1 (en) | 2020-10-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230075485A1 (en) | System and method for triggering an alarm during a sensor jamming attack | |
| US20230246905A1 (en) | Cooperative monitoring networks | |
| US10665072B1 (en) | Sensor to characterize the behavior of a visitor or a notable event | |
| US20220351598A1 (en) | Enhanced audiovisual analytics | |
| US10176705B1 (en) | Audio monitoring and sound identification process for remote alarms | |
| US7864983B2 (en) | Security alarm system | |
| US10026289B2 (en) | Premises management system with prevention measures | |
| CA2949370A1 (en) | Detecting a premise condition using audio analytics | |
| CN110009869A (en) | Method, device and system for monitoring activity information | |
| US11138869B2 (en) | Alarm system | |
| Prakash et al. | FSAS: An IoT‐Based Security System for Crop Field Storage | |
| US20250119697A1 (en) | Detecting interference with sound sensing devices | |
| EP3301656A2 (en) | System and method for an alarm system | |
| US12106642B2 (en) | Methods and systems for monitoring and reporting security breach of a property | |
| Fagbohun et al. | Design of a Central Wireless Security System Using Atmega328, ZigBee and Arduino | |
| Prakash et al. | Research Article FSAS: An IoT-Based Security System for Crop Field Storage | |
| Haider et al. | Prevention of Educational Institutions from Terrorist Attacks using IoTs | |
| Rani et al. | Active infrared motion detector for house security system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: CARRIER CORPORATION, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LISEWSKI, TOMASZ;RUSEK, RADOSLAW;SIGNING DATES FROM 20190619 TO 20190621;REEL/FRAME:052489/0912 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
| AS | Assignment |
Owner name: KIDDE FIRE PROTECTION, LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNORS:CARRIER CORPORATION;CARRIER GLOBAL CORPORATION;CARRIER FIRE & SECURITY EMEA;AND OTHERS;REEL/FRAME:072829/0172 Effective date: 20241121 Owner name: KIDDE FIRE PROTECTION, LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CARRIER CORPORATION;CARRIER GLOBAL CORPORATION;CARRIER FIRE & SECURITY EMEA;AND OTHERS;REEL/FRAME:072829/0172 Effective date: 20241121 |